If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Yea, I've done a lot of "Network Stress Testing" with that tool "Dynamic Object Oriented Multiplexer" tool. And of course the other load testing software I used a lot for school; "Quick User Assessment Completion Kit" or "QUAKE" for short. Just to make sure of course the college network could handle the load.

That is priceless.

\"Those of us that had been up all night were in no mood for coffee and donuts, we wanted strong drink.\"

It's a proud day for bastards anywhere when 4 posts in a row are all from the BOFHs. *Sniffle*.

*Chest swelling with pride*. My other PFY has hit it on the head in one of my points that having physical access will probably always equal root access

Unless of course they make a laptop where it has a full hand scanner that also checks a temp too so you can't saw someone's hand off and use that to get passed the reader heh. Then of course you could still set his hand on fire and dip it in warm water to make it still read it, but hey I didn't say it was bulletproof.

My apologies for not being able to frame the question correctly. I was simply asking what steps one could take to harden the process of accessing the data if one has physical access (for example, in case of lost/stolen laptops)?

Thank you
Phenom

The First Ape Who Became A Man Thus Committed Treason Against His Own Kind. — Mikhail Turovsky

My apologies for not being able to frame the question correctly. I was simply asking what steps one could take to harden the process of accessing the data if one has physical access (for example, in case of lost/stolen laptops)?

Thank you
Phenom

The actual data can be protected with hard encryption (i.e. AES) As far as preventing someone from being able to make use of the equipment, it is just a matter of replacing parts.

There are encryption methodologies that will absolutely prevent access unless the user has the correct credentials to "Unlock" the data. So physical access is meaningless.

That being said, that type of methodology is flawed in that only one or few will have such credentials. Now those of you that remember Novell from the early days. If you forgot your admin password, or your administrator got pissed - changed the password and left. You were pretty much ****ed!

There will always be back doors, some line of test code not removed from the production release, something that with enough time and money - we'll get it. And to be honest, usually we will find your unencrypted data in the trash can, or facebook or somewhere where you least expect your data to end up.